监控Github上的漏洞、红队等信息。
GitHub监控消息提醒!!!
更新了:RCE
描述:AI Agent to provide information about the prices of the electricity (RCE) and weather forecast for the upcoming day which will allow user to plan respective actions.
URL:https://github.com/TomaszPaslawski/SmartEnergyAgent_PL
标签:#RCE
更新了:RCE
描述:AI Agent to provide information about the prices of the electricity (RCE) and weather forecast for the upcoming day which will allow user to plan respective actions.
URL:https://github.com/TomaszPaslawski/SmartEnergyAgent_PL
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/dien-x/Fileupload_vul
标签:#RCE
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/dien-x/Fileupload_vul
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/1766377729-lang/Fileupload_vul
标签:#RCE
更新了:RCE
描述:在 Web 应用程序中,文件上传功能如果未对上传文件的后缀名、MIME 类型及内容进行严格校验,攻击者可以上传恶意的脚本文件(如 PHP、ASP、JSP 等)。一旦这些脚本被服务器解析并执行,攻击者即可获得服务器的远程执行代码(RCE)权限,从而控制服务器。
URL:https://github.com/1766377729-lang/Fileupload_vul
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:PoC Dawn Client v2 RCE
URL:https://github.com/bodeneinheit/dawn-v2-rce
标签:#RCE
更新了:RCE
描述:PoC Dawn Client v2 RCE
URL:https://github.com/bodeneinheit/dawn-v2-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Demonstration of escalating Local File Inclusion (LFI) to Remote Code Execution (RCE) using log poisoning.
URL:https://github.com/VVVI5HNU/LFI-RCE-log-poisoning
标签:#RCE
更新了:RCE
描述:Demonstration of escalating Local File Inclusion (LFI) to Remote Code Execution (RCE) using log poisoning.
URL:https://github.com/VVVI5HNU/LFI-RCE-log-poisoning
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce-poc
标签:#RCE
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce-poc
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce
标签:#RCE
更新了:RCE
描述:This repo contains RCE exploit for Imagery htb machine
URL:https://github.com/symphony2colour/htb-imagery-rce
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:CVE_2023_27532 RCE only
URL:https://github.com/W1ngLess/CVE_2023_27532
标签:#RCE
更新了:RCE
描述:CVE_2023_27532 RCE only
URL:https://github.com/W1ngLess/CVE_2023_27532
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Target Acquired. The Ultimate Web Scanner & Auto-Exploitation Tool. From Recon to RCE in a single strike.
URL:https://github.com/Meow-011/LOCKON-ORBITAL-STRIKE
标签:#RCE
更新了:RCE
描述:Target Acquired. The Ultimate Web Scanner & Auto-Exploitation Tool. From Recon to RCE in a single strike.
URL:https://github.com/Meow-011/LOCKON-ORBITAL-STRIKE
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Nextjs RCE Exploit Kit
URL:https://github.com/tesweva/Nextjs-RCE-Exploit-Kit
标签:#RCE
更新了:RCE
描述:Nextjs RCE Exploit Kit
URL:https://github.com/tesweva/Nextjs-RCE-Exploit-Kit
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
标签:#RCE
更新了:RCE
描述:php-in-jpg is a simple yet flexible tool that generates .jpg image files embedding PHP payloads, designed to support PHP RCE polyglot techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-9932
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50498
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50498
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Mirage uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526
标签:#RCE
更新了:RCE
描述:Mirage uses C++, PHP, HTML, Python, and Ansible to deploy a vulnerable IIS server capable of spawning a reverse shell and Remote Code Execution (RCE) on target machines.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-50526
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793
标签:#RCE
更新了:RCE
描述:🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.
URL:https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-51793
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/LeirBaGMC/RUCKUS-Security-Research
标签:#RCE
更新了:RCE
描述:Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
URL:https://github.com/LeirBaGMC/RUCKUS-Security-Research
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Repositorio para la aplicación de ingesta del RCE
URL:https://github.com/emailesc/ASIGH_IW
标签:#RCE
更新了:RCE
描述:Repositorio para la aplicación de ingesta del RCE
URL:https://github.com/emailesc/ASIGH_IW
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in _load_ccd_pickle_cached() of chemical_components.py in AlphaFold 3 (v3.0.1) - (github.com/google-deepmind/alphafold3)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-AlphaFold-v3.0.1
标签:#RCE
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in _load_ccd_pickle_cached() of chemical_components.py in AlphaFold 3 (v3.0.1) - (github.com/google-deepmind/alphafold3)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-AlphaFold-v3.0.1
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in load() of predictor.py in Vertex AI SDK v1.121.0 - (github.com/googleapis/python-aiplatform)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-Vertex-AI-SDK-v1.121.0
标签:#RCE
更新了:RCE
描述:Command Injection / Remote Code Execution (RCE) via Insecure Deserialization in load() of predictor.py in Vertex AI SDK v1.121.0 - (github.com/googleapis/python-aiplatform)
URL:https://github.com/JoshuaProvoste/Command-Injection-RCE-Vertex-AI-SDK-v1.121.0
标签:#RCE
GitHub监控消息提醒!!!
更新了:RCE
描述:SMBv1: CVE-2017-0143, gravedad 8.8, de ejecucion remota de codigo (RCE), en Windows con SMBv1 (ms17-010)
URL:https://github.com/hackingyseguridad/smb
标签:#RCE
更新了:RCE
描述:SMBv1: CVE-2017-0143, gravedad 8.8, de ejecucion remota de codigo (RCE), en Windows con SMBv1 (ms17-010)
URL:https://github.com/hackingyseguridad/smb
标签:#RCE